期刊文献+

云桌面在党校信息化系统中的应用 被引量:1

Application of cloud desktop in information system of party school
下载PDF
导出
摘要 传统的设备维护方式已无法满足党校培训教学、科研的新培训需求。文章采用云桌面方式,可以降低学校长期运行成本。云终端和服务器总体故障率较低,可节省硬件维保和支持成本。设计一个可靠、高效的云桌面,在桌面性能不足时,无需淘汰原有硬件资源,只需添置部分服务器来实现整体性能提升,保护现有教育资源。 The traditional equipment maintenance method has been unable to meet the new needs of training teaching and scientific research in party schools.The article uses the cloud desktop way,can reduce the school long-term operation cost.The overall failure rate of cloud endpoints and servers is low,resulting in savings in hardware maintenance and support costs.A reliable and efficient cloud desktop is designed.When the desktop performance is insufficient,it is not necessary to eliminate the original hardware resources,but only to add some servers to achieve the overall performance improvement and protect the existing education resources.
作者 蔡琴 Cai Qin(Information Network Center Cpc Xinjiang Uygur Autonomous Region Committee Party School,Urumqi 830002,China)
出处 《无线互联科技》 2019年第7期159-160,共2页 Wireless Internet Technology
关键词 云桌面 桌面虚拟化 虚拟终端 cloud desktop desktop virtualization virtual terminals
  • 相关文献

参考文献6

二级参考文献53

  • 1李伯虎,柴旭东,朱文海,邸彦强,王鹏,施国强,谭娟,殷润民,侯宝存.现代建模与仿真技术发展中的几个焦点[J].系统仿真学报,2004,16(9):1871-1878. 被引量:153
  • 2YangXiaojing,ZhouZhiwei,ChenXiaoming,MaYuanle,LiFu,DongYujie,WuWei,OhiTadashi.Study and Development of a Simulation System for Dynamic Evaluation on Man-machine Interface Design of Advanced Main Control Rooms of Nuclear Power Plants[J].工程科学(英文版),2005,3(1):23-27. 被引量:2
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1

共引文献1086

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部